{"id":658,"date":"2012-09-13T08:30:30","date_gmt":"2012-09-13T06:30:30","guid":{"rendered":"http:\/\/blog.gdsys.de\/en\/?p=658"},"modified":"2012-09-13T08:30:30","modified_gmt":"2012-09-13T06:30:30","slug":"tempest-certificate-or-how-to-protect-sensitive-data","status":"publish","type":"post","link":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/","title":{"rendered":"The TEMPEST certificate, or how to protect sensitive data"},"content":{"rendered":"<p>It&#8217;s common knowledge that <strong>IT devices<\/strong> like computers play a huge role in our everyday life. But a thing almost no one knows is that IT devices <strong>emit radiations<\/strong> containing data. And that&#8217;s also the reason why you cannot apply any devices in critical areas such as the military. When it comes to transmitting sensitive data, the TEMPEST test ensures that devices are ready to be applied in such areas. But what exactly is this test? And how do you get your devices certified? That&#8217;s what we will show you in five easy steps.<\/p>\n<h2>1. What does TEMPEST mean?<\/h2>\n<p><a title=\"More information about TEMPEST\" href=\"http:\/\/www.advprograms.com\/tempest.htm\" target=\"_blank\">TEMPEST<\/a> is short for &#8220;Temporary Emanation and Spurious Transmission&#8221;. The TEMPEST test therefore refers to compromising emanations from electronic devices.<\/p>\n<h2>2. What are compromising emanations?<\/h2>\n<p>Any IT devices such as computers, keyboards, mouses, or even printers emit radiation. This radiation reaches further than you might think. But why is it called <strong>compromising emanation<\/strong>? Well, because compromising emanations can be intercepted and analysed and thus may disclose the information transmitted or otherwise processed. Once sensitive data gets in the wrong hands, the consequences could be fatal.<\/p>\n<h2>3. What&#8217;s so important about the TEMPEST certificate?<\/h2>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-medium wp-image-667\" title=\"The TEMPEST-certified DL-MUX4-MC2\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101-300x150.jpg\" alt=\"The TEMPEST-certified DL-MUX4-MC2\" width=\"300\" height=\"150\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101-300x150.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101-1024x512.jpg 1024w, https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Whether using them privately or to do your job &#8211; there are almost no areas that don&#8217;t use IT devices. Almost all processes run on computers: bureaucracy, data storage, organisational , the Internet &#8211; you name it. That&#8217;s why certain industries need to ensure that data from their devices cannot be intercepted.<br \/>\nAnd that&#8217;s exactly where the <strong>TEMPEST test<\/strong> comes into play: The test measures the degree of a device&#8217;s compromising emanation, since the emanations are different for each IT device. Long story short &#8211; the TEMPEST test defines if and in what safety zone devices can be used.<\/p>\n<h2>4. What are safety zones?<\/h2>\n<p>The TEMPEST test differentiates between <strong>four zones<\/strong>. Zone 0 represents the highest safety level whereas Zone 3 represents the lowest. Therefore IT devices that are to be applied in Zone 0 must fulfil much higher standards than Zone 3 devices. G&amp;D&#8217;s KVM switch <a title=\"More information about the TEMPEST-certified DL-MUX4-MC2\" href=\"http:\/\/www.gdsys.de\/en\/products\/kvm-switches\/dvi-dlvga-kvm-switches\/dl-mux\/\" target=\"_blank\">DL-MUX4-MC2<\/a>, for example, can be used in Zone 1.<\/p>\n<h2>5. Why is it useful to get a TEMPEST certificate for devices?<\/h2>\n<p>TEMPEST-certified devices <strong>can be used in sensitive areas<\/strong> such as the military. The certificate makes sure that sensitive data cannot be intercepted despite compromising emanations.<\/p>\n<h3>Five steps to reach the goal<\/h3>\n<p>Of course, there are more details to be considered prior to and during certifying a device. But these five steps provide you with the basics you need to know about the TEMPEST certificate.<\/p>\n<p><em>By: Cennet G\u00fclmen<\/em><\/p>\n<div class=\"shariff\" data-title=\"The TEMPEST certificate, or how to protect sensitive data\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/blog.gdsys.de\/en\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"tlx\" data-services='[\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"whatsapp\",\"mail\",\"info\"]' data-image=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101-300x150.jpghttps:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101-300x150.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101-1024x512.jpg 1024w, https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg 1920w\" data-url=\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/\" data-lang=\"en\" data-theme=\"color\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>It&#8217;s common knowledge that IT devices like computers play a huge role in our everyday life. But a thing almost no one knows is that IT devices emit radiations containing data. And that&#8217;s also the reason why you cannot apply any devices in critical areas such as the military. When it comes to transmitting sensitive &#8230;<\/p>\n","protected":false},"author":2,"featured_media":667,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The TEMPEST certificate, or how to protect your sensitive data<\/title>\n<meta name=\"description\" content=\"Compromising emanations from electronic devices can lead to sensitive data being intercepted. TEMPEST-certified devices help prevent such scenarios.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The TEMPEST certificate, or how to protect your sensitive data\" \/>\n<meta property=\"og:description\" content=\"Compromising emanations from electronic devices can lead to sensitive data being intercepted. TEMPEST-certified devices help prevent such scenarios.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-13T06:30:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bianca Schmidt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\",\"url\":\"https:\/\/blog.gdsys.de\/en\/\",\"name\":\"Corporate Blog from Guntermann &amp; Drunck\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg\",\"contentUrl\":\"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg\",\"width\":\"1920\",\"height\":\"960\",\"caption\":\"The TEMPEST-certified DL-MUX4-MC2\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#webpage\",\"url\":\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/\",\"name\":\"The TEMPEST certificate, or how to protect your sensitive data\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#primaryimage\"},\"datePublished\":\"2012-09-13T06:30:30+00:00\",\"dateModified\":\"2012-09-13T06:30:30+00:00\",\"author\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08\"},\"description\":\"Compromising emanations from electronic devices can lead to sensitive data being intercepted. TEMPEST-certified devices help prevent such scenarios.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"The TEMPEST certificate, or how to protect sensitive data\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08\",\"name\":\"Bianca Schmidt\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g\",\"caption\":\"Bianca Schmidt\"},\"description\":\"Redakteurin, \u00dcbersetzerin und Bloggerin bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Editor, translator and blogger at Guntermann &amp; Drunck. You can find me on LinkedIn.\",\"url\":\"https:\/\/blog.gdsys.de\/en\/author\/schmba\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The TEMPEST certificate, or how to protect your sensitive data","description":"Compromising emanations from electronic devices can lead to sensitive data being intercepted. TEMPEST-certified devices help prevent such scenarios.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/","og_locale":"en_US","og_type":"article","og_title":"The TEMPEST certificate, or how to protect your sensitive data","og_description":"Compromising emanations from electronic devices can lead to sensitive data being intercepted. TEMPEST-certified devices help prevent such scenarios.","og_url":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/","og_site_name":"Corporate Blog from Guntermann &amp; Drunck","article_published_time":"2012-09-13T06:30:30+00:00","og_image":[{"width":"1920","height":"960","url":"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg","type":"image\/jpeg"}],"twitter_misc":{"Written by":"Bianca Schmidt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/blog.gdsys.de\/en\/#website","url":"https:\/\/blog.gdsys.de\/en\/","name":"Corporate Blog from Guntermann &amp; Drunck","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg","contentUrl":"https:\/\/blog.gdsys.de\/en\/files\/2012\/09\/F_DLM4_MC_RGB_300_101.jpg","width":"1920","height":"960","caption":"The TEMPEST-certified DL-MUX4-MC2"},{"@type":"WebPage","@id":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#webpage","url":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/","name":"The TEMPEST certificate, or how to protect your sensitive data","isPartOf":{"@id":"https:\/\/blog.gdsys.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#primaryimage"},"datePublished":"2012-09-13T06:30:30+00:00","dateModified":"2012-09-13T06:30:30+00:00","author":{"@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08"},"description":"Compromising emanations from electronic devices can lead to sensitive data being intercepted. TEMPEST-certified devices help prevent such scenarios.","breadcrumb":{"@id":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gdsys.de\/en\/2012\/09\/13\/tempest-certificate-or-how-to-protect-sensitive-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The TEMPEST certificate, or how to protect sensitive data"}]},{"@type":"Person","@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08","name":"Bianca Schmidt","image":{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g","caption":"Bianca Schmidt"},"description":"Redakteurin, \u00dcbersetzerin und Bloggerin bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Editor, translator and blogger at Guntermann &amp; Drunck. You can find me on LinkedIn.","url":"https:\/\/blog.gdsys.de\/en\/author\/schmba\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/658"}],"collection":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/comments?post=658"}],"version-history":[{"count":22,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/658\/revisions"}],"predecessor-version":[{"id":681,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/658\/revisions\/681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media\/667"}],"wp:attachment":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media?parent=658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/categories?post=658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/tags?post=658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}